config system global set internal-switch-mode interface endwill probably not work as long as there is anything associated with internal port (DHCP and Firewall policy it was in the past) Afterwards it will reboot coming back with seperate ports. You can also create a trunk (802.1q tagged valsn on one interface), not sure whther this works with a internal switch so you can use DMZ, WAN1 or WAN2 for that (remember: This are only names). -> System ->interfaces - and hit " create" here you can enter you vlan ID give your FGT IP Adresses in each network, create policys from Network A -> B and B -> A and so on.. Fortigate will route the packets (but you need policys!)
You can do that. You need to create policy where you allow traffic between these networks (interfaces) and check off the NAT. It will create routing rule.
You can even put multiple sources and destinations in the policy so you don't need to create multiple policies for that.
User | Count |
---|---|
1921 | |
1144 | |
769 | |
447 | |
277 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.